Reasons not to buy any Samsung Devices especially the A21 phones - Samsung Galaxy A21s Real Life Review

Samsung holds your phone hostage!
1. Blocks you from factory resetting your phone even when you provide your identity (You really have to go above and beyond to prove that you are who you say you are even with an unlocked phone)
2. Samsung stores your information and continuously uploads your information from your phone photos texts and all even when you disable items it reenables and blocks you from making changes in system settings
3. Tech support is not in the US in fact it isn't even in Asian perse it's in Indonesia or Pakistan and the customer service is in my experience not so friendly
4. The fact that you have to provide your full address, full name and date of birth for security reasons and it still doesn't count unless you provided every number you ever used with the device this is TRACKING You
5. Why is Samsung like Google so hell bent or survielence of it's users... You spend money for your device and they continue to act like youre an renter of the device instead of the owner.
5. My device is an unlocked South American device although I am in North America. Once I get this matter sorted out with Samsung I am selling off all of their devices Will never purchase anything from Samsung again. Also stay clear of Google, Microsoft and Amazon devices. So many things that I could say that are a security risk and a true risk to national security... The countires taht are at war with each other are also in cohoots together if you look at the security certificates on your phone. You attempt to delete, remove or disable those items Google and Samsung will diable your phone... block you from browsing the net, can block your camera, block you from doing basic things with your phone that you own. This is telecommunications/technological terrorism and warfare.

Related

VOIP sip IS NOT YOUER friend and bill gates locks forumz!!!!!

Let me start be saying would to thank this forum for existing but some **** is just stupid.
Schapps has been the closest to making VOIP work and stay up
I believe the code just released the client just released is open I don’t believe he's done yet
I can make the broken client work but that’s easy if you take the client set up screen and place it in front you next to the installation directions of a third party vendor(I am assuming my friend Mr Bullin know s what hat means)
On a thread below I left few parts out, due to the fact that their is a US based company offering free software that they copyrighted. I don’t understand how one can assume the power of free open sourced client.
Here’s my answer on only gates would close a forum he would pay then lie.
Copyrighting a client that I believe I said works. Ok tell me how genius how dopes it work I am confused what makes it work what are the main factors should not be hard to find
Current Released Version 2.0.1 feedback
can not hear does not work well and say reg on when off very confusing explain
http://forum.xda-developers.com/showthread.php?t=299950&page=76
part 2
I did how ever fix or should I just used it as a starting point to connect.
The first 6 ROM I used was from Mfrazz very nice rom
XDA Mobile 6
It had the sip protocol tool that is now copyright worthy
I would be lying if I said it was not a ****y tool, but very simple.
So it was easy to cross reference the fields when I held it up next to a soft phone that’s is licensed ( another piece of paper that has the year and a federal stamp on it)
So the whole point is no one has actually presented a client that works like a normal piece of software and is plug_and_play per say.
Out of respect for his ability and determination I have been watching the intense process that schapps has put in and I’m sure he has a full blown solution behind it.
Now here is for the jerk offs you know guys who are quick to open that mouth. Not that my typing doesn’t piss you off apologize, but for the real idiots the talented the individuals that make one move and they know everything.
VOIP is fun the idea of free telecom fills a hacks cup and a businessman cup.
But the term it is not your friend means that there are so many variables in a conection that from a programmers stand point the equation seems to drive them deep down the rabbit whole.
Well never read manual but I do know one thing it wouldn’t be put on the front of the TODAY screen if it was rocket sience.
The fact is it its quite simple all the phone needs is an IP address then it can be a voip phone.
Well last I checked one big telco company called cellular one and another company called Panasonic teamed up with this other company Motorola and Nextel( a phone company) as we know it was formed. Well Nextel is based off of Static IP’s the concept is not new.
I was up all night working on my client and now its done here
Mind v.l1
http://support.t-mobile.com/knowbase/root/public/tm51424.htm?
Please by al means do what you do best and somebody and bring that client back to the board cause I probably will not be attending anymore of the open board sessions. Its bad enough to type but to have to here a *****es opinion about me and not flex is not easy.
part 3
I was taught one thing don't ever have an ego and be able to do it your self. That’s I got nothing crazy to say to any the confused individuals that seem to have a very passionate deep opinions.
Being able to make things is talent and 1000 revolutionary features on a state of the art phone system that no will ever use, because the beautiful minds that made it decided they would use their ideas for the end user environment is worthless.
100% of a broken client is worthless.
Helmi said something very important, taking credit for another mans work is weak, I fell the same way just like certain countries are weak.
Gates never shows his face i understand i wouldn’t either.
Logic is cool but until you make million clean or can answer this question how much cash can you fit in a standard carry on briefcase? Don’t be so quick to fire that virgin mouth cause in the real world guess they don’t give **** so appreciate my feed back I can tolerate personality
voip
What the client on the phone is for the INTRANET
( Again this the network ( a group of computers connected to work as one) inside of a infrastructure and behind a router fire wall t1) MR BULLIN
I was saying that I was surprised that it was not pre exposed but then I remember the fact that it always misfires and a telecoms nightmare cause no body physically put it into play.
(referring to a live call center with 30-100 tsr’s on the phone generating $15-$30k a day)
Can you imagine the importance of redundancy and the fact that big companies can’t afford to ever be down. So voip came and went some companies got desperate and are still trying to push a switches and charge $40k. The main Problem is support companies want the easy way out that’s why we are here.
Why doesn’t the iphone doesn’t have voip, but yet mac’s client is one of the best on the market. Cause jobs will not release anything half which means No body could see voip is very efficient very easy to use and the best way to go if you are building some thing from scratch. JUst like Americas cellular data service is free
http://forum.xda-developers.com/showthread.php?t=288844
We all have bring something to the table and just cause I cant type doesn’t mean that I cant kick a door down or 20 but this not my forum as matter fact I keep getting demoted. But I can’t complain cause its still my home and I there is one thing about the mind. If you want an answer ask. When I see some one make a wrong move I never knock it he tried or he is trying that makes 3% which is what controls the worlds wealth.
But having a “I am the **** website poll” and a fan club now that’s cute.
If you want to talk data networking and voip or how to disassemble a mda in less then 15 minutes. I am available and over qualified.
I fear if I speak anymore I might start say bullin and the moderator will demote me to a symbol like prince.
When in doubt and all else fails just look at it and the answer is usually right in front of you.
If I don’t get back to another special request it is due to the fact that I have quite a few employees to worry about.
XDA ROCKS and your better go hands than going mind trust me you want none.
I can translate aboutthemind:
He's stating that the WM6 VoIP client is full of bugs but the allure of "free" calling over VoIP has appeal to both hackers and businesses alike so we keep banging away at it. So far, he feels that Schaps is the closest to having a "functioning" native WM6 client (mine works better IMHO ).
He also stated that M$ "supposedly" released this but the WM6 platform has seen no "official" Internet calling application since none of the Operators have decided to pick up on it (due to apparent revenue issues). m$ (Gates) has been silent on the availability since the initial betas. So his point is this:
Is Internet calling even a release level feature of the WM6 ROM? Perhaps not. Perhaps we should instead be devoting our energies to other more proven technologies and building them in to our ROMs.
aboutthemind is far from an idiot; he merely communicates differently.
edit (I have to read posts many times to extract all intellectual content):
abouthtemind also states that the Internet calling app was designed for INTRANET only and believes its IP address/NAT related that causes the issues we experience trying to use it over 3G.
I personally disagree with this because my TyTN works fine with my asterisk server over 3G. What's different about my connection? Very high speed (Business class RoadRunner) server access along with very high speed phone access (AT&T pda connect plan). I use DHCP at my 3G connection and my asterisk server is configured for NAT at both ends. Using G.711, I experience millisecond drops (audio is occasionally choppy) but have both-way audio. I'm also not getting ring-back (can't hear ringing tone on my TyTN while the remote end is ringing) but I believe this is an asterisk configuration problem.
I therefore believe Internet Calling audio issues are codec related and that the one way issue is caused by congestion at our phone's virtual network card. G.711 is all that is support out of the box and, as such, does no compression. This is one of the reasons why INTRANET connections work: more bandwidth at the phone. G.729 is held out as the "holy grail" solution here, but my research indicates that current phone processors my not have enough power to use G.729. I could be wrong here in that a native processor version could exist, but I'm concentrating on GSM610 instead because there is a good compression ratio, and the codec is already optimized for the ARM V4I instruction set (which itself is pseudo-code of course).
@aboutthemind: I remain committed to solving the codec issue for the reasons above. I too want to produce an out-of-the-box solution & will release a new ROM with my fixes if I do. I say "if" not "when" because understanding codec code itself is rocket science... in the examples they actually invoke assembler to do some math processes because the C compiler optimizations aren't quite fast enough . Besides this, I'm not fully convinced that the WM6 RTC layer is fully ACM codec compliant. There may be an issue at compress/decompress time which only works with G.711 because G.711 does no compression.
Finally, why spend all this energy on WM6 Internet Calling instead of simply cooking in a more proven solution? Here:
Solution must have tight phone integration: press the green button and call or receive call
Solution must have tight contact integration
Solution must use phone earpiece not speaker and have good volume
Solution must transfer over bluetooth to car handsfree
Right now, Internet Calling, while not there for sure, actually comes closest and therefore holds the promise of working with all of the above. I believe that fixing the codec will solve points one and two. Hardware itself causes issue 3 and may only be solvable by changing phone hardware. IMO, a quick tweak should solve issue 4 and I will start working on that when I get a reliable GSM610 codec working.
Hi Sleuth,
I have to admit that I never had enough patients to read posts of aboutthemind.
However I agree with most of conclusions you have drown here. Both from aboutthemind posts and your own.
1. Idea to have VoIP client inbuilt and closely integrated with the device system is very appreciated.
2. The client, however should work with the system as you have described. It means that it should actually take over the control of the system and use the peripherals of the device together with the native phone application.
It would be great if we could make the RTC client work properly, but I am afraid, it is very difficult if possible at this stage of the RTC development.
That is way maybe starting a new project could be better solution.
This was about generals, now to back to RTC.
I am not exactly sure if the g711 codec is not capable to work properly both in WiFi and 3G/HSDPA environment. Also I believe, G729 implementation in our mobiles can be done.
I am plaing with VoIP for long time already. Talking about mobile devices, I used to have old HP with PCMCIA WiFi card installed and SJPhone working on it. It was pretty good solution for that time. Later I used Asus PDA with WiFi on board, but without phone option. I used there SJPhone and X-Pro from Counterpath. The last one was commercial product with g729 implemented. And it worked. The processor was Intel 520 MHz. This shows that it could be done. Unfortunately Counterpath has withdrawn this product from the market.
Ok. These were early implementation. There was no integration with the system, it was aimed to PPC with WiFi only and so on.
Now We have WM6 on devices with UMTS/HSDPA on board and I am sure, sooner or later VoIP will be integrated with the system.
At the moment I am usually using Ageet phone, which works perfectly, both on WiFi and 3G, specially with HSDPA. It does not have G729, but it uses GSM, G711, ILBC and Speex, I believe. The only problem with this soft is, that it is not integrated with Phone applet in the WM6. This makes impossible to place calls directly from your contact list. It can import the contact list, but then it does not recognize all does phone number formats, so you need to have them in format, which is accepted by your voip provider. There is also obvious problem with audio redirection to bluetooth headset and receiving a call using green button or headset button.
By the way, I have tested Ageet phone as well as some other commercial phones with many different VoIP providers and environments including my own commercial VoIP network based on PortaOne Switch. All those apps work perfectly with all possible networks.
This can not be said about RTC client. It works with some servers (asterix, FWD in eg.) but does not work with others (PortaOne servers in eg.).
So if we decide to work on RTC, then we should take in mind that there is not only a problem with one way audio in some configurations, but also that this client does not fully complies to SIP protocol and because of that it is cut of from servers like PortaOne, while trying to initiate the call. I have described the problem in my post in your (Shaun's) thread: http://forum.xda-developers.com/showpost.php?p=1241766&postcount=561.
On the other hand Age company is also marketing its SDK. It seems to me that this SDK is really very good, both for PC and PPC environment. The footprint of both versions of their applications is very small . You can see it specially in WM6 if you observe how little memory it takes. Unfortunately the SDK is a commercial product, but they can provide it with G729 included. The question is how to deal with such a project if it would be based on this SDK?
This are only my thoughts. If somebody is interested in taking those thoughts further on, I am open for cooperation.
We shouldn't condemn this guy out of hand. I am not sure whether English is his mother tongue/first language. If it is not then he should post up in his own language and then someone can translate.
From the Sleuth's post it seems that aboutthemind is making some very valid points; its just that the way he puts it is not that easy to decipher.
WB
Here's some bad news that confirms aboutthemind's suppositions:
I've been playing with a compilable GSM610 codec which I can insert into my Hermes WM6 RTC stack, and its looking more and more like a buggy rtcdll that's the core issue. The RTC has 3 built-in codecs. Two are known to work: g.711 alaw & ulaw. The other, g.722.1 (also called "Siren"), is a floating point codec which I haven't enabled.
Plugin ACM codecs such as gsm610.acm appear to be correctly supported from a registry standpoint. The RTC uses the "Dll" value to find the correct acm codec, and uses WaveForm parameters to negotiate. These all appear to work as advertised.
However, while my code is getting normal ACM calls and correctly encoding information using the GSM codec, the other end only hears garbled sounds. Likewise, I'm not getting any input to the decode logic and my earpiece is dead.
This could still be a huge pointer translation issue causing the output buffer to be incorrectly addressed but that is looking more and more unlikely.
It would appear that RTC 1.5.5374 isn't fully ready for prime time from a plugin codec perspective. I'm now looking more closely at rtcdll.dll....
ITMT, g.711 alaw appears to work best over 3G. If you are using asterisk or TrixBox, you can limit your mobile extension's codec negotiation to only use alaw as follows:
disallow=all
allow=alaw
Gentlemen, Mr Slueth, time to handle this voip issue
I do apologize i had have 2 major prodjects in play so considering voip is the most efficient and logical solution i am say live. I built 3 platforms with a russain and Ukraine programmers that why a patiently waited until we could get past the feminism not to disrespect anybody i can only trouble or comment if i too have experienced the same issues threw out my life.
But i am bit off a tough guy and i was raised to not say a fcking thing in a multiple lister environment unless you took into consideration recourse and ones interpretation. Translation don't talk and don't ever disrespect nobody or you would catch a beating.
Well times have changed and now doing time is like a course offered in college so you can not even smoke on earth anymore!
I must say the first time i spoke was to protect the integrity of an individual inhere from a ungrateful member. Moist important i was able to use his solution to secure my ability to resurrect any type of wizard. So i thanked him but i was more bothered by the disrespect for ones efforts by another.
Can you believe THE MUTHAFRkr actually turned on me, i couldn't understand.. I get plenty of thanks in the real world via the new times, let alone from here daily and tell u truth i have never gone public. I have given quite a few Domestic companies a whole new way to think an they actually took some **** i had for me.
Its not my looks or my level of intelligence's that gets you the label one of the best in the game today.
For me it is me, meaning i only do things one way with no ego. I beciome the end user and think like they do. That means that i have to assume that i have been misunderstood when some insults me and take full responsibility for both parties. Move on. But being that i am a communication specialist and most important a fix my company specialist. I was ia bit confused my self until i realized where this forom is out of and the fact that i never looked at all the flags that people throw so now i get.
Just like free data doesn't appeal to most of the moderators and senior members why would it like this it doesn't apply.
So don't expect to much from people that are abroad simply because its old news or doesn't excite them.
Only work people that have respect i don't need to suit here and chicken peck the keys. My language is free spoken cause im at home so the least i can do is swear. I am a bit of a phycological warrior with a few gifts. But try to mind **** over the computer after this run was proven and deemed a failure.
If i needed validation i would not be in a studio loft and drive a rental. YOu are only as good as your teachers. And the best of the best dont wear it on their chest.
But lets face it i to am in the lab on a whole other level.
I bang this out with guys if you want.
And MR sleuth with much respect to you sir. The ability to see probably not the first time being i only guess what the vendors and clients look like. My coments to schapps was for the visuals and hinted not drop code its as bad as my typing to a non programmer and a turn off. I am a true fan and have true passion let alone credential in voip. Again not into knocking some determination or work that would be my ultimate mistake if ever making any in life.
So with that i need some answers so i can go get you what you need if you see my previous posts i threw up a flag so i could solve this but i have read all the posts so and again have not wanted to disrupt the determination but saw it was gonna drive down a very long hard maybe a little road.
1 why do you need to use the gprs client on an acm environment.
2. Can we nail one type down?
We only need one to work then the idea would be to expose the path
it then be a true team effort from the various camps here and all over
3.Do you see what i see in the us regarding the fact that hot spots are also gprs and the idea is a free cell phone that is free cause of this effort not cause its the internet.
I don't know about you but i would never want to speak over the internet abut anything none business related meaning my day to day.
5. Nothing is secure fear is the best security system one can have
Finish our discussion on sip Please do mot use the vendors names i have a major personal issue with people selling free open source software and have other people produce clients for free. The whole thing keeps out of that environment. Just personal thing
But i threw together 2 asterisk systems they shuttles and i will join you i you bring me to speed meaning the clients to test or the ability.
I also had a Hermes delivered today for this fix, the phone is in 4 pieces and looks like a standard owner had buyers remorse and after he bricked it he killed it but looks like this Hermes is going to live by tomorrow.
I am a visual type of person so for instance sip was seek and destroy that was the pitch.
Voip was {Phone--------Switch(homeofiice firewallsrouters,NAT)---- -----------------------(Switch)home/offiicefirewallsrouters,NAT)---phone
SIP was assuming you did not have any thing but home configured. It was suposed to find its way home in business pitch.
I understand networking and the concepts but dont dig in with logic.
I was thinking more if i understand why you need multiple codecs and why we cant just split open the t mobile client which by the way is from blue tooth sig. A bluetoothe company with all the stk's from every vendor available. that is going broadband for those who don't know and yes you can surf the net on blue tooth.
This what i bring way out side box and i think we can do this faster if i can implement the way come up with this stuff.
the sdk is a valid concern so i would be more than happy to split apart any piece that causes a mental block my boy z in the Ukraine still are waiting for the yahoo and google checks. I will also pardon anyone who has remorse.
Most important is the connections and the resources to use for all my in house work is the usually the mother ship and she doesn't speak English and has no copy right.
I am player in this but i don't program so you will be amused by the remedial questions and nuclear answers.
But lets do this fast with no ego and i was not implying anything directly to your present work or anyone above this specific page. If you weren't all genius i would be any way. And my goal is to let that even t-mobile is not my carrier they let me see a way out and all the holes in service so this is not about the codes it about stepping back finding the manufacture that makes the phone pulling the client customizing and then giving it up for free to those that are willing to give up the sunlight for the red eyes and constant domestic issues.
I have some things that you might be able to use li really dont know cause i good but even i stopped following when you flipped ways in one session. I'm sure once you fill me in i will pick it up instantly. Hardware and risk of destruction, well that would be my pleasure.
PS i did not proof read this so ii hope it has impact
Agreed. The built in G.711 codec works well over WiFi. I'm having no issues other than battery life related which can't be solved easily... The WM6 RTC isn't really designed to run over 3G anyway. My AdapterTypes registry hack was what made it do this and that flushed out a few "undocumented features" for sure. Case in point: it doesn't detect changes in GPRS/3G availability such as when you USB connect to ActiveSync. So you have to physically stop Internet calling by choosing "never" in the Internet tab of the Phone Settings dialog, then restart it by choosing "Whenever Available" to make it connect again. It also doesn't automatically start the data connection if it is off and will instead again say "Not Available" until you manually start the data connection then perform the above stop/start routine.
This being said, having a GSM610 codec functioning would lower the bandwidth requirements considerably. I have a few more tests to make today with this codec; it may be that the algorithm itself isn't properly spec'ed to GSM610. Some quick tests will determine this. I'm a developer and I want to understand this you see
At any rate, I'd like to get my hands on a newer version of rtcdll.dll than the one that's in my Hermes ROM.
edit:
First test completed: I disabled the final encoded buffer transfer to the RTC. The rationale here being that if the same garbled sound was heard then the Wm6 RTC itself was the culprit. Instead, I heard what would be expected if the RTC was truly acting on the encoded buffer: silence. Now I have to dig more into the codec itself. The sample GSM code does a double frame encoding (each input PCM buffer is treated as two GSM610 encoded frames). I'm not sure if the WM RTC is prepared for this or not..... Heck, there may even be a transport layer issue causing the garbled sound. More research is required.
Anybody interested in playing along can do so with their own asterisk server. There's actually a Virtual appliance containing Trixbox, FreePBX and other goodies that make startup a snap. Just load the free VMWare player, point it to the fully configured virtual machine and you're up and running.
A link to this free appliance along with the vmware player itself can be found here.
The 3CX softphone that can receive direct ip calls (dial it's address using the form nn*nn*nn*nn on your Internet calling equipped HTC phone when both devices are WiFi connected to the same network) can be found here
I'm playing with my Asterisk server... But fun ends pretty fast when you realise you can't really go anywhere. I'm no genius to come out with a hack which recompiles a TRUE softphone into a dll which wraps the MS one and bypasses the ridiculous limitation of the earpiece vs speaker problem and then goes to Mars etc, etc... So I learned that I might just get another phone if I really want to enjoy VOIP on my mobile. I like my S710, would have been one of the best mobiles to enjoy VOIP (I think) but:
1) No, no, smartphones can't have the VOIP stack
2) You can try to hack it in but earpiece is only available to "modem"
3) etc.
I'm a bit disappointed must say.
Ka.
It is possible to redirect audio from multimedia speaker to earpiece for any HTC phone with Syren audio chip.
namely:
HTC Tornado
HTC Excalibur
HTC Vox
HTC StarTrek
.......
Also, we have positive resultes with many HTC Pocket PC Phones. namely:
HTC Hermes
HTC Trinity
.......
I do not understand why HTC has disabled audio redirection. HTC audio driver is capable of audio redirection from multimedia speaker to earpiece for any multimedia stream..
Sorry, I wouldn't be able to tell more regarding this issue. But the bottom line is: IT CAN BE DONE.
I guess, HTC decided to leave this option out for reason or...
kast said:
......
2) You can try to hack it in but earpiece is only available to "modem"
......
Ka.
Click to expand...
Click to collapse
By reading forums around I learned that on some phones it could be possible.
I'm not sayint it's a hardware issue (as I got no clue about hardware), on the other hand we're limited by the drivers they provide us, limited by the API we can use.
I read somewhere that it might be possible to redirect an audio stream to the earpiece when the "phone part" is actually being used. Even if it is a modem connection.
Meaning we might have the phone to instanciate a "fake call" and then redirect the audio stream to the earpiece. Meaning that... Yes, true, audio streams could be redirected to the earpiece but not very easily.
Now, faking a call or anything like this is not really something I can code in two seconds and try. Don't even know if it could be possible. So, I still hope in the one, as I said in a post above, genius to hack a DLL, put some sticky tape around, couple of API calls he's the only one to know of and send a Shuttle to Mars. I know there are many of these in this forum, luckily.
Ka.
Some interesting ACM plugin codec developments:
I now have the exact same garbled audio in both directions . However the reason it now works at all is a fundamental clue that I'm now looking into. The frames being sent to the decoder appear to be about half the size that it's designed to handle.
Specifically, the integer divide of input size \ GSMBLOCKSIZE was zero because size was < GSMBLOCKSIZE. If this size was zero, the encoder initially just exited. I changed the code so that if the division = zero and the original size was greater than zero then the divided size was now 1 instead of 0. Result was identical garbled audio in both directions.
It may actually be the "double frame" encoding/decoding logic that's dying. This GSM codec was designed for the audio ACM system and the RTC system may well be quite different....
Dr what have you done you mighht actually have to use a responder
RTC dll i would tell tomorrow however it will surface tonight i would expect it to. with all the network drops i have soembody better email a fake one.
Just tell you are aware of trixy and that i am not a fan of the model solution takes 15 mins but i am not a fan i am if it is for your house the key is to not spend any money i failed. trixy comes in all forms and Phonn lattttyy does not need any more advertising. Unless you say so, i don't say it to much trust me in fact the west coast best called me to tell me he was shocked about the revelations. In fact i have been asked to plan and design a company structure 50 times on astrik never it sfree. I am a businessman and don';t get out of bed for less than a nickel or if you ask for my help. I built a phone system with instructions simply the desire for the perfect ADD autistic solution. A+B=C no games in your face gorilla direct marketing ...............we can get into that later.
Please don't push trixy unless you have a reason and im ok with that but please mispel. Is the fact that i dealt with them as a customer inquiring blind ready to buy so my opinion is like business i have no friends and am not biast in any which way or form. Respect plays a great deal for me.
Non the less you just sped me up of why no need to answer. Please look at some of my bulll regarding a way out. All we need is a way out well this little basted showed up today and no i am armed but let please make this
http://www.hp.com/rnd/products/switches/switch2324-2312/overview.htm
Why is it not your friend because the day you plug a monitor and key board into a pbx it now becomes a computer and it doesn't say that in the manual.
this things need to be configured once walk never go back dont surf the mnet on your meal ticket or allow it too.
Business only.
Home eat off it.
Why would one want to play in this game well thats where i come in.
Here is why evryone gets a piece
1.XDA takes the left side (usa the glutens consumers right here right now).
2. I will get6 the data free thats my goal it will come
3. we have cellular for free it would motivate our off shore friends to stop looking straight and look up and see that with the right team the your everyday is worth all the money not me jeeves my rodeo is over, but i don't stand alone.
3. I think voip was invented off shore and i want to see the pie piper cause i did it in less than 5 minutes while i was peaking over seas on an analog line. My very good friend laughed and said why do have so much interest in tis idea like he has had one for ever.
Omega can handle the basic questions sleuth don't stop keep going i will be back later unless you reply but i am burried.
I have always believed that a true hack is someone that doesn't want to be pointed or controlled for mew it was just i need it right right now. And of course a man down or payroll. If i didn't kick the door down then i would be in the Microsoft forum across street. yet we all stay on windows what lovely world
To all the new people the m,ember in my name stands for my member and please follow
these rule if you may
Just understand if u asked most likely you will get an answer but why stop this it will be done in less than a month.
T-mobile well i think $5.99 is good enough for us to a least spend a little time on a full lock down
IF you want to say something it does not have to make sense. Only a robot talks before they think!!!!
Governor i take it you will come up with gold and the hermes in front of me just gave me a light no screen but a light so by morning
PS i will not be a part of turning a domestic company into a major player i will not have a board on this and this is for strictly the love of the game
The soft phone was brilliant like my title this simply a forum for Slueth powered by xda inspired by the mind of a gorilla.
Sleuth picture and generic links gets peoples attention a whole lot faster you just turned us into support know what i mean.
But besides the pda no pbx thier is no need for that. Anyone want in pm The dr up thier you want that stuff
Slueth those are the visuals i need now i keep on you with the acm **** dont get mad when i tell you about the stack
**** meaning reference not idea or client
ACM< if gfor the big boys all one solution I love it but i wrote it
see u later sir
i got $1000 says just like all software that t-mobile client is siop
look at the t-mobile version and apple no ego i you dont and do what i cant read.
The answer is out their like he said you should push a button. HEre look at this how i do it.l
http://client.hotspot.t-mobile.com/
http://client.hotspot.t-mobile.com/
I mean come on i don't need to tell you download the t-mobile client tell me what you say anything t-mobile is crackable they based of cracker land and they believe in sharing or taking the entire industry ewho cares the clinet you have may be dead but who knows
You need a way to talk to the pbx with your cell. So let give you facts thier are no parameters and 80
% is marketing i know i iwrite the pityches
So take a client 98 it does not matter if it works on cups and yarn it will easly transition
For instance i install cabs until my phones crash and let me tell the big boys cabs work on all mobile so i believe and again i don't know if you read the t mobile site like view the code tools page info mozzilaa the flag of who they are using is their and the client they donut know what they got it will be the full version no seciruity and wide open it the patches and upgrades r ember i didn't know that you could licenses software i just unplugged the dongle or key and went back to work. ALl businesss and they first $50,000 solutions had no security.
Anyone from overseas has a never mind sleuth its time to copy paste all the worlds carriers that how you do it. If t-mobile does not pick an aragant country and you will find someone that is exerting their dominance
All you guys reading fdeel free to drop a line on your carier i will hit them by night .
Just like abhove
they are giving you your answer. maybe not the way you want iot but a wy to go fast and efeciant.
then i always look at the bottom by law they have to show you thier kitty kat
T-Mobile HotSpot Security Statement
In providing this Security Statement and the Frequently Asked Questions ("FAQs") that follow, we want you to be better informed about the security limitations and features of the T-Mobile HotSpot service.
Our T-Mobile HotSpot network is based on wireless local area networks ("WLANs") that use evolving technology based on the IEEE 802.11b/g standards. WLANs, which enable "over-the-air" communications, may be subject to unauthorized interception and are not inherently secure. Additionally, a laptop computer, personal digital assistant ("PDA") or other device using wireless connections may be more vulnerable to unauthorized attempts to access data and software stored on the device. We therefore cannot guarantee the privacy of your data and communications while using the T-Mobile HotSpot service.
However, we have designed the T-Mobile HotSpot network and provide certain encryption technologies to better safeguard your wireless communications. We also support customer-provided security solutions, such as virtual private networks ("VPNs"), personal firewalls, and anti-virus software. For your protection, at all T-Mobile HotSpot locations your credit card or other payment card information, as well as any personal information that you send to us via our website when signing up for HotSpot service, is encrypted using secure socket layer ("SSL") technology which prevents unauthorized persons from reading that information. SSL technology is the standard for data encryption and server-side authentication for secure Web-based transactions (such as e-commerce). Additionally, we encrypt your user name and password each time that you submit them to access the T-Mobile HotSpot service.
We also offer an enhanced wireless security technology over our entire T-Mobile HotSpot network known as Wi-Fi Protected Access ("WPA") with 802.1x. Once you are authenticated onto the T-Mobile HotSpot network, WPA with 802.1x encrypts all of your data traffic when it is transmitted wirelessly from your Wi-Fi device to the T-Mobile-installed, Wi-Fi access points at each T-Mobile HotSpot location. This encryption technology helps protect against unauthorized interception of your data while it is transmitted "over the air", and it helps to mitigate against session hijacking (the ability for unauthorized individuals to access Wi-Fi service for free by using a customer's session).
You may take advantage of our WPA with 802.1x security enhancement when you install our new T-Mobile Connection Manager (version 1.5 or more current release) on your Wi-Fi device. Another advantage of the T-Mobile Connection Manager is that it automatically validates the T-Mobile HotSpot network when authenticating, thus ensuring that the customer is connected to a legitimate T-Mobile HotSpot network and not an unintended third-party Wi-Fi network.
The new T-Mobile Connection Manager is available for download at http://client.hotspot.t-mobile.com, or, if you prefer, you may obtain it in CD format at no charge from many of our retail stores and participating HotSpot locations. You can confirm that the WPA with 802.1x software is functioning by looking for the "1X" on your Connection Manager user interface. Should you have any problem
If you choose not to use the T-Mobile Connection Manager, you may use compatible WPA with 802.1x software designed by other companies. However, proper configuration of such third-party software is necessary in order for the solution to work and to mitigate against security vulnerabilities. T-Mobile does not support and cannot guarantee the functionality of third-party WPA with 802.1x software.
Please note, however, that WPA with 802.1x does not protect your data when it is transmitted over the Internet. Once you connect to the Internet, it is your responsibility to use appropriate encryption technologies such as a VPN or to use websites that offer SSL technology. We do not provide protection for any Internet communications. You should be especially careful when transmitting user names, passwords, credit card numbers, financial data and other sensitive and confidential information across the Internet without ensuring that appropriate security precautions are in place. Depending on your situation, these communications may be transmitted without encryption and may be vulnerable to unauthorized interception in the HotSpot location or on the Internet.
T-Mobile HotSpot strongly recommends you take measures to secure your Wi-Fi devices and Internet communications. We encourage and support many customer-provided security solutions, such as VPNs, personal firewalls, anti-virus software and the use of websites that provide SSL encryption for your data. It is your responsibility, however, to take these precautions and provide security measures best suited to your situation and intended use of the service. We do not currently provide these solutions and cannot guarantee or otherwise be responsible for their effectiveness.
Please note that appropriate safeguards should be used for any type of wireless technology or Internet access via any service provider. If you are interested in learning more, a few sources of additional information are: the National Infrastructure Protection Center's website at http://www.nipc.gov/publications/nipcpub/bestpract.html and CERT's website at http://www.cert.org/tech_tips/home_networks.html.
Below are some tips that can help you protect yourself when using the
T-Mobile HotSpot service or any other public Wi-Fi service to access the Internet:
Use the T-Mobile HotSpot Connection Manager software which, when installed on a laptop, automatically validates the T-Mobile HotSpot network when authenticating and encrypts "over the air" communications
If you are using a browser, verify that it is using SSL to validate the T-Mobile HotSpot network via server-side authentication
Ensure that any website to which you are transmitting sensitive personal or financial information uses SSL technology. To confirm that a website is using SSL:
Look for the "https://..." in the URL address
Look for a closed padlock (or key) icon in the bottom right-hand corner of your Internet browser as indicators you are accessing a secure site
Do not ignore security warnings from the browser
Inspect the Web site address in your browser's URL field to ensure you are communicating with the correct, secure Web site
Use VPNs and personal firewalls
Use anti-virus software and keep the software updated
Be aware that others may be able to look "over your shoulder" to see your login, credit card, or other personal information while using the service. The use of a privacy screen on your computer screen may help prevent others from seeing what is on your computer.
Properly log out of web sites by clicking log out instead of just closing your browser, or typing in a new Internet address
Avoid using web-based email or instant messaging that uses clear (unencrypted) text to send information you deem confidential
Remove or disable your wireless card if you are working offline on your computer and you are not planning to connect to the HotSpot service
get me off this limit member mky ass your lucky here i waiting to post ****
AGlossary of WLAN security acronyms
802.11b/g Industry standards designation for wireless ethernet
SSL Secure Socket Layer
PDA Personal Digital Assistant
VPN Virtual Private Network
WEP Wireline Equivalent Privacy
Wi-Fi Industry brand designation for wireless ethernet
WLAN Wireless Local Area Network
WPA Wi-Fi Protected Access.
i m out i didn't read but oi know companies now r ember they contradict hot spots with the card that goes into the laptop hot spots are wifi but also fre gprs back door read into that i cant this takes me hours to type

Does the G1 have security issues?

I was talking to some co-workers about my G1 and the features that the 1.5 firmware adds to the phone. One co-worker says he'll never get an Android phone because he heard it had security issues. Specifically, he heard that the phone's location services is always broadcasting the phone's location while the phone is on, and that it is possible to use that broadcast to remotely connect to the phone (and therefore take data off the phone).
I tried searching, but couldn't find anything in Google or elsewhere that confirms or refutes this supposed security issue. Anybody know if this security issue is real or is my co-worker misinformed?
I guess he might be referring to Google Latitude. Latitude is a service similar to Loopt that lets you share your location with a list of Google contacts of your choosing. It's completely optional and off by default. There is another remote access service where Android Market may remotely delete an installed app that was downloaded from the Android Market if it was found to have violated one of the Market's TOS. This does not affect apps not installed by Market. A similar guideline is in place with the iPhone and Blackberry stores.
All phones that access a cellular network can be tracked some way or another, regardless of what operating system is installed. It's not hard to understand why: in order to use the cell network, you have to connect to a cell. Now that cell knows approximately in a few km radius where you are. Using timing triangulation, cell networks can locate a person to a few hundred meters. This kind of information is accessible by emergency services.
In reality, your coworker(s) are no more qualified to speak on Android as they are about any other mobile phone operating system on its privacy as they (I assume) have never seen the source code of any of them.
compupolis said:
I was talking to some co-workers about my G1 and the features that the 1.5 firmware adds to the phone. One co-worker says he'll never get an Android phone because he heard it had security issues. Specifically, he heard that the phone's location services is always broadcasting the phone's location while the phone is on, and that it is possible to use that broadcast to remotely connect to the phone (and therefore take data off the phone).
I tried searching, but couldn't find anything in Google or elsewhere that confirms or refutes this supposed security issue. Anybody know if this security issue is real or is my co-worker misinformed?
Click to expand...
Click to collapse
Android is one of the (if not absolutely the) most secure mobile OS available.
Providing the location of the device is PURELY OPTIONAL, and does not IN ANY WAY create a security risk. Just because you know the location of something does not mean that you can get into it. Take an armored car as an example. It can be driving down the street right in front of you, and that does NOT help you break in to it.
In fact, the location is absolutely USELESS for breaking into something. If there was a security vulnerability, it would be the NETWORK ADDRESS (location independent) that would give someone a viable attack.
Now as it sits, Android is Linux -- well known for very strong security (unlike that redmond virus that is known for seeking out and installing every kind of self destruct mechanism it can find). But unlike a standard linux distribution, when multiple programs are run by a single user, each of those programs are run as a DIFFERENT USER. Each program gets unique credentials within the system and is isolated from all the other programs. That means that if you have one program that is BOTH listening for network connections AND provides some bug/backdoor/etc. through which someone could break in, then that person breaking in would be restricted strictly to the userspace of that particular program. In other words, they could get or break the data for THAT PROGRAM and not any other program.
You can get the same degree of poorly written programs for ALL operating systems. What makes a system secure is what it does to keep one broken program from taking down the rest of the system, and for this, Android is very strong.
So now you can tell your coworker that he is full of $61t.
Can someone indulge us on how Iphone's security works? I'm pretty sure that it's inferior to G1's but I'd like to know the facts so I can stick it to couple fanboys that I know.

[Q] Protecting our info

quotes from http://www.popularmechanics.com/tec...-your-phone-during-a-traffic-stop-5587825?rss
"According to an American Civil Liberties Union (ACLU) letter to the director of the Michigan State Police on April 13, that department has several forensic cellphone analyzers deployed in the field. Forensic analyzers are routinely used in police investigations to recover data from computers and other digital devices."
"According to Cellebrite's product description, the UFED can grab email, Web bookmarks, Web history, SIM data, cookies, notes, MMS, instant messages, Bluetooth devices, locations, journeys, GPS fixes, call logs, text messages, contacts and more. '
You can call me paranoid but if this gets to be a major issue, is there a way to protect our information on our phones?
EDIT
After some searching here are a few other threads with concerns about the UFED: http://forum.xda-developers.com/showthread.php?t=1043865
http://forum.xda-developers.com/showthread.php?t=1045464
Came across this little bit of info and it might help stop the UFED. Its a review but it states which type of phones are not compatible with the UFED.....gotta make our phones software more similar to the Chinese software they use for their mobile devices???? And locked SIM cards must be unlocked also prior to extracting.
http://www.forensickb.com/2010/03/how-do-you-extract-information-from-45.html
I might be WAY OFF so somebody correct me. But doesn't the RAM hold everything like encryption keys or passwords if the phone is off or locked or something? So it doesnt matter if u get rid of your SD card or SIM card.......
Read this Devs it might help with prevention:
http://docs.google.com/viewer?a=v&q...V-ax7z&sig=AHIEtbRi6bj5_cppZB_bnS2qEERS5v5DDg
http://computer-forensics.sans.org/...ite-ufed-extract-phone-data-file-system-dump/
throw them away. put your tinfoil hat on, and dig a deep hole. if you circumvent it, and the police want / need to read it - which they probably never will - but if they can't, they're only going to get the rubber gloves out and throw you in guantamo prison.
HD2, Android on SD, get pulled over, eat the SD card!
It's the only way
DirkGently1 said:
HD2, Android on SD, get pulled over, eat the SD card!
It's the only way
Click to expand...
Click to collapse
You can pick up a fuze or tilt2 pretty cheap nowadays and do the same.
Sent from a super smooth captivate running andromeda
I wonder if having custom roms would interfere with this?

Security Concerns

So I work as a consultant, and traffic sensitive information through my devices. Really interested by this device, but I am unfamiliar with Blackberry's practices as a company. Maybe some of you can help me.
Will the physical device be secure should someone physically get ahold of it? Particularly foreign governments. I travel frequently for work and it is not too far a possibility that my device could be seized, and it's vitally important that the contents stored locally be secure on the device. Not so much concerned about the obvious follies of the transmission of data as once it hits a network it's open for the taking anyway.
Thanks.
This device is supposed to just as secure as all other blackberry devices, since blackberry is the standard for enterprise servers i think this might be good for you.
It encrypts all data by default, has added security on top of androids usual.
It would definitely will be a step up from Nexus 6 that you are using. But, if you are having sensitive data on your phone. I dont know why you are using Nexus 6. You should be using something like BB passport or classic. Anyway, this phone has native encryption. Meaning, anything stored in the phone is encrypted.
But i believe the device is not rated up to the Government security clearance yet. But it does have hardened kernel and DTek security app to control what data each installed app can access.
I don't currently store anything on my phone, would just make life easier if I could. Thanks guys.

Need Help With Hacker / Malware Removal!!!

I have had a malware/hacker problem with my home computers, network and mobile phones for approximately 18 months. I am hoping that someone with your team will be able to help diagnose and assist in permanently removing the issue as I have not had any success with help from others to date. The malware seems to persist across factory resets and/or firmware flashs. Device details are listed below, at the end of this post.
The phones will randomly download/upload personal content, i.e. files and folders, to cloud accounts and other devices, randomly open and close applications, alter or corrupt files that have been downloaded to the phone, change file location on the devices, alter permissions, block or change root status (if rooted), deny un-root, disallow applications to be installed, removed or function correctly, hijack the wireless/blue-tooth and mobile data capabilities, eavesdrop on phone conversations and access the devices camera and microphone, communicate with other devices, possibly controlling them to a certain extent..
Similar problems exist with the personal computers. Mobile data usage has increased from 5G per month to well over 50G, reaching as much as 100G in a months time. I was forced to change plans with my internet service provider to accommodate data usage of 600G a month from the 300G plan I was on originally, where I only used 1/3 of that or less per month. Lastly, my identity has been stolen multiple times over the 18 month period I have had this problem. I am concerned the infection resides at the hardware level but I do not know how to confirm if that is possible with Android devices and don't want to purchase anymore new device as I have previously tried with 6 desktops, 4 laptops, 5 smartphones, 5 routers and 4 modems.
I have reached out to the local authorities, computers repair shops and worked with some of the top names in the anti-malware industry, only to be either turned away with disbelief or the lack of capability to do something to resolve the problem. Any help is greatly appreciated. Thank you.
Device List
Mobile Phones:
- Samsung Galaxy S8 Plus (currently in service with Verizon)
- Samsung Galaxy S7 Edge (currently in service with Straight Talk, previously Verizon)
- Samsung Galaxy S7 (not in service, original service provider: AT&T)
- iPhone 7s (in service with Straight Talk, previously Verizon)
* If necessary, please inquire about additional computing and networking equipment.
lol
Sounds like the easiest solution is to take a hammer to everything and start fresh.

Categories

Resources